Windows 7 has escaped the monthly patching process executed this week, but has not escaped hacker's attention. some security researchers said they have discovered the first zero-day attack security vulnerability in Windows 7. microsoft is investigating this issue.
Security researcher laurentgaffié called Microsoft on Wednesday (March 13, November 11) to criticize Microsoft's SDL (secure development lifecycle) process. he also published a proof of concept that uses this security leak code. he said the security vulnerability code could crash the Windows 7 and Windows Server 2008 R2 systems.
Gaffié said in his blog that this security vulnerability is a real proof of SDL failure. This security vulnerability is very simple. If SDL exists, it should have been discovered two years ago.
The core of this security vulnerability is the SMB (Server Message Block) Protocol Based on Windows file sharing. according to gaffié, this security vulnerability causes an infinite loop of SMB protocol and can cause this fault remotely through the IE browser. gaffié announced the concept of using the Security Vulnerability code in November 11, proving that it had reported the security vulnerability to Microsoft in November 8.
Although Microsoft has encountered SMB security vulnerabilities in the past, security researchers pointed out that using the default firewall to set such security vulnerabilities is very difficult to exploit. there is a way to bypass this security vulnerability: block ports 135, 139, and 445 on the vro or firewall to prevent external SMB communication from entering the system.
ChetWisniewski, senior security consultant of anti-virus software company Sophos, is not surprised to discover security vulnerabilities as soon as Windows 7 is released. he said that this is because the Windows7 code was finalized as early as this summer. attackers have been searching for security vulnerabilities for many times. this security vulnerability is not hard to find, causing attackers to boast about themselves and say how stupid Microsoft has discovered this security vulnerability.
This security vulnerability is currently not dangerous to users. as gaffié pointed out, using this security vulnerability can cause host crashes. this means that the computer will be restarted. wisniewski pointed out that this zero-day attack security vulnerability is not in the form of worms so far. It is only applicable to Windows7 and WindowsServer 2008 R2. this means that this attack is currently only a Denial-of-Service attack.